Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU40282
Risk: Low
CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-3185
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to #BASIC_IMPACT#.
The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 5.5.0 - 7.0.3
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00052.html
https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00056.html
https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00058.html
https://php.net/ChangeLog-5.php
https://php.net/ChangeLog-7.php
https://www.securityfocus.com/bid/84307
https://www.ubuntu.com/usn/USN-2952-1
https://www.ubuntu.com/usn/USN-2952-2
https://bugs.php.net/bug.php?id=70081
https://bugs.php.net/bug.php?id=71610
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.